Search Results - message ((authentication using) OR (authentication _))

Refine Results
  1. 1

    A lightweight secure authentication for vehicular ad-hoc networks by message encapsulation and trusted authority dependency-less scheme / Tarak Nandy by Tarak , Nandy

    Published 2022
    “…This proposed method, in return, needs less message transfer during authentication as well as communication. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The time of message authentication operation in the IEEE 802.15.4 WSN is decreased by DMAC. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol by Jaisan S M, Ashish

    Published 2024
    “…This study proposes SECS/GEM-AE, a mechanism for securing SECS/GEM data messages using AES-GCM encryption and evaluates its performance against the standard SECS/GEM protocol and SECS/GEMsec, a security mechanism proposed to authenticate SECS/GEM messages.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A Chaos-Based Authenticated Cipher with Associated Data by Je, Sen Teh, Samsudin, Azman

    Published 2017
    “…The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. …”
    Get full text
    Get full text
    Article
  7. 7

    A Chaos-Based Authenticated Cipher with Associated Data by Je, Sen Teh, Samsudin, Azman

    Published 2017
    “…The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A new tunnelled EAP based authentication method for WiMAX networks by Alezabi, Kamal Ali Ahmed, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin

    Published 2013
    “…PKMv2 uses either RSA-based or EAP-based authentication modes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Token Based Authentication Method Using Bluetooth Enabled Mobile Phone by Abdel Hameed Mokhtar, Rania

    Published 2004
    “…This model ensures that a non-legitimate user's mobile phone cannot provide authentication services to other user's laptops, and it uses an authenticated and encrypted Bluetooth wireless link to ensure that there is no eavesdropping, modification, and insertion of messages traveled over the link.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine by Mat Isa, Mohd Anuar, Ahmad, Miza Mumtaz, Mohd Sani, Nor Fazlida, Hashim, Habibah, Mahmod, Ramlan

    Published 2014
    “…In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). …”
    Get full text
    Get full text
    Article
  12. 12

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is well known that the existing weak mechanism for authenticating binding update messages is one of the biggest security weaknesses in MIPv6. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Plan recognition scheme using multi-factors authentication for smart card online system by Mohd Ariffin, Noor Afiza, Mohd Sani, Nor Fazlida

    Published 2014
    “…This research introduces a new scheme named plan recognition authentication scheme that use for smart card based on networking system. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Increase throughput of CCM security mode using MKP by Ahmad Zulkarnain, Zuriati

    Published 2014
    “…The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. …”
    Get full text
    Get full text
    Article
  16. 16

    Character property method with biometric multifactor authentication for arabic text steganography by Roslan, Nuur Alifah

    Published 2018
    “…We apply biometric multi factor authentication to enhance the security of the transmitted shared secret key used to extract the stego-text. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Two factor authentication by using SMS for web based application by Hamid Ali, Firkhan Ali, Mohammad Hanza, Mohammad Zaim, Mohd Sukri, Mohd Khairul Amin

    Published 2020
    “…This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Security and performance enhancement of authentication protocols in heterogeneous wireless networks by Alezabi, Kamal Ali Ahmed

    Published 2017
    “…In addition, the size of messages exchanged between the User Equipment (UE) and Home Subscriber Server (HSS) is reduced by 19%, this effectively reduces authentication delay and storage overhead. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Efficient authentication mechanism for defending against reflection-based attacks on domain name system by Hasan, Dana, Hama Amin, Rebeen R., Hussin, Masnida

    Published 2020
    “…In this paper, we proposed the Efficient Distributed-based Defense Scheme (EDDS) to overcome the shortcomings of a centralized-based defense mechanism. By using an authentication message exchange, which is a Challenge-Handshake Authentication Protocol (CHAP)-based authentication mechanism. …”
    Get full text
    Get full text
    Get full text
    Article